Skip to main content

Technology Implementation - eCrime

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240409-103327-48

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will walk through the most frequent and impactful attack paths observed by threat actors targeting public safety organizations around the world. Using the MITRE ATT&CK matrix, we will breakdown the tradecraft observed targeting emergency services, and detail the importance of understanding the critical steps of the kill chain. Additionally, we will unveil insights from the criminal underground to highlight what they believe are the most valuable aspects of public safety.

20240409-103322-54

Submitted by Bryan Lee Dail on
This webinar will show how parallel investigation techniques commence with a review of tactics and strategies that can be introduced in related fraud enquires. The importance protecting the tradecraft deployed and the use of open and closed source research will be discussed to include comparable techniques used in covert sensitive investigations. Money laundering utilizing virtual, or cryptocurrency will be featured to examine current tradecraft. Additionally, this presentation will include discussion of the impact on not-for-profits as well as a look at mortgage fraud.

20240409-103312-86

Submitted by Bryan Lee Dail on
Departments nationwide are being inundated with reports of cryptocurrency facilitated crimes, specifically investment fraud. This webinar will cover the fundamentals of investigating fake cryptocurrency exchanges and "pig butchering". Attendees will understand the various ways these fraudulent services, such as DeFi "wallet drains," from taking the initial report to furthering the investigation.

20240409-103302-87

Submitted by Bryan Lee Dail on
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the intelligence analysis questions you submit. Submit questions regarding intelligence analysis skills, information collection, or general comments of analytic tradecraft and a panel of NW3C experts will provide answers during this live session.

20240404-90337-55

Submitted by Bryan Lee Dail on

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

20240404-83616-47

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting public safety. We will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix, and detail how threat actors have been adapting to continue to be successful in 2023. Presented by: Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

20240404-83612-24

Submitted by Bryan Lee Dail on
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.

20240404-83608-52

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.

20240404-83603-11

Submitted by Bryan Lee Dail on
Miami-Dade County Police Department and Middlesex County NJ Prosecutors Office team up to look at cases involving artificial intelligence supported criminal trade craft, challenges for investigations, and digital forensic considerations. This presentation will review illustrative cases studies, technical considerations and investigative approaches applied. The webinar will also examine other potential criminal tactics techniques and procedures where support from artificial intelligence is likely to present in the future.

20240404-83559-72

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums,VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams. This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.
Subscribe to Technology Implementation - eCrime